libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 16 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution. | |
| Title | libbabl 0.1.62 Broken Double Free Detection Memory Safety | |
| First Time appeared |
Gegl
Gegl gegl |
|
| Weaknesses | CWE-415 | |
| CPEs | cpe:2.3:a:gegl:gegl:0.1.62:*:*:*:*:*:*:* | |
| Vendors & Products |
Gegl
Gegl gegl |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-16T15:25:55.585Z
Reserved: 2026-05-15T14:52:46.405Z
Link: CVE-2020-37239
No data.
Status : Received
Published: 2026-05-16T16:16:20.097
Modified: 2026-05-16T16:16:20.097
Link: CVE-2020-37239
No data.
OpenCVE Enrichment
No data.
Weaknesses